Risk
6/14/2010
11:53 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Ipswitch Acquires MessageWay In Merger Of Managed File Transfer Vendors

Acquisition will pave the way for more secure application-to-application communications, partners say

Ipswitch, a maker of secure, managed file transfer products and services, on Tuesday will announce it has acquired MessageWay Solutions, a provider of managed file transfer and business integration solutions.

Terms of the deal were not disclosed.

With the addition of MessageWay to its product family, Ipswitch will provide a wide range of secure file transfer services and capabilities, including of advanced analytics, enterprisewide monitoring, and high-performance data translation and transformation for EDI, ERP, and a variety of other message formats, the companies said.

"When people in the industry talk about security, one of the things that they don't often mention is that about 80 percent of the exchanges that go on between companies are exchanges of files between applications, not between people sitting at a desk typing at a computer," says Greg Faubert, president of MessageWay. "This is an area that's becoming more important all the time."

"The file transfer market is changing, not only in the volume and size of messages, but in the way they are handled," says Gary Shottes, president of Ipswitch. "The worlds of managed file transfer, EDI, and middleware, which have typically been handled by different vendors, are converging. We think we'll be in a position to take market share away from all of those more focused players, by offering solutions that provide a more integrated approach." The need for managed file transfer is increasing as organizations look for ways to meet industry and regulatory requirements, such as SOX, PCI, FISMA, and HIPAA, the executives said. Many enterprises need a better way to show a "chain of custody" on file transfers, proving to auditors that data is safe as it travels between partners.

"What we offer is the ability to exchange files securely through the DMZ without the file ever landing on disk," Faubert says. "Companies can submit files or retrieve files through an open protocol, but without the file ever residing in the red zone.

"Once the data gets to its destination, it's encrypted and housed in a secure database," Faubert explains. "The only way for an attacker to get into those files would be for them to have access to the physical disk, all of the encryption keys, and a copy of our software."

Ipswitch expects its combined offerings to get traction in industries where secure file transfer is required, such as financial services, government, and healthcare.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web